Yannick Seurin
Yannick Seurin
Cryptography Expert, ANSSI
Email verificata su ssi.gouv.fr - Home page
Titolo
Citata da
Citata da
Anno
PRESENT: An ultra-lightweight block cipher
A Bogdanov, LR Knudsen, G Leander, C Paar, A Poschmann, ...
International workshop on cryptographic hardware and embedded systems, 450-466, 2007
29242007
Fast rotation of a Bose-Einstein condensate
V Bretin, S Stock, Y Seurin, J Dalibard
Physical review letters 92 (5), 50403, 2004
4582004
HB#: Increasing the Security and Efficiency of HB+
H Gilbert, MJB Robshaw, Y Seurin
Advances in Cryptology–EUROCRYPT 2008, 361-378, 2008
250*2008
Hash functions and RFID tags: Mind the gap
A Bogdanov, G Leander, C Paar, A Poschmann, MJB Robshaw, Y Seurin
International workshop on cryptographic hardware and embedded systems, 283-299, 2008
2242008
Simple schnorr multi-signatures with applications to bitcoin
G Maxwell, A Poelstra, Y Seurin, P Wuille
Designs, Codes and Cryptography 87 (9), 2139-2164, 2019
1822019
The random oracle model and the ideal cipher model are equivalent
JS Coron, J Patarin, Y Seurin
Annual International Cryptology Conference, 1-20, 2008
1592008
Good variants of HB+ are hard to find
H Gilbert, M Robshaw, Y Seurin
Financial Cryptography and Data Security, 156-170, 2008
1062008
Counter-in-tweak: authenticated encryption modes for tweakable block ciphers
T Peyrin, Y Seurin
Annual International Cryptology Conference, 33-63, 2016
1022016
On the exact security of schnorr-type signatures in the random oracle model
Y Seurin
Annual International Conference on the Theory and Applications of …, 2012
1012012
Minimizing the two-round Even–Mansour cipher
S Chen, R Lampe, J Lee, Y Seurin, J Steinberger
Journal of Cryptology 31 (4), 1064-1119, 2018
962018
Sha-3 proposal: ECHO
R Benadjila, O Billet, H Gilbert, G Macario-Rat, T Peyrin, M Robshaw, ...
Submission to NIST, 2008
88*2008
How to encrypt with the LPN problem
H Gilbert, MJB Robshaw, Y Seurin
International Colloquium on Automata, Languages, and Programming, 679-690, 2008
852008
An asymptotically tight security analysis of the iterated Even-Mansour cipher
R Lampe, J Patarin, Y Seurin
International Conference on the Theory and Application of Cryptology and …, 2012
742012
EWCDM: an efficient, beyond-birthday secure, nonce-misuse resistant MAC
B Cogliati, Y Seurin
Annual International Cryptology Conference, 121-149, 2016
632016
Tweaking even-mansour ciphers
B Cogliati, R Lampe, Y Seurin
Annual Cryptology Conference, 189-208, 2015
592015
On the provable security of the iterated Even-Mansour cipher against related-key and chosen-key attacks
B Cogliati, Y Seurin
Annual International Conference on the Theory and Applications of …, 2015
582015
Deoxys v1. 41
J Jean, I Nikolic, T Peyrin, Y Seurin
Submitted to CAESAR 124, 2016
572016
ZMAC: a fast tweakable block cipher mode for highly secure message authentication
T Iwata, K Minematsu, T Peyrin, Y Seurin
Annual international cryptology conference, 34-65, 2017
502017
A domain extender for the ideal cipher
JS Coron, Y Dodis, A Mandal, Y Seurin
Theory of Cryptography Conference, 273-289, 2010
472010
Aggregate cash systems: A cryptographic investigation of mimblewimble
G Fuchsbauer, M Orrù, Y Seurin
Annual International Conference on the Theory and Applications of …, 2019
432019
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20